Estimated time: 10-20 minutes Use this to rotate Redis authentication credentials with no planned pod restarts.
Symptoms
- Planned credential rotation window.
- Potential credential exposure requiring immediate password rollover.
Prerequisites
- Permission to update Secrets and annotate
RedisCluster. - Client/application teams ready to switch credentials quickly after rotation.
- Shell variables:
Diagnosis
Recovery Steps
Optional: ACL Secret Rotation
Ifspec.aclConfigSecret is set, rotate ACL rules by updating that secret’s acl key.The instance manager applies this live with
ACL LOAD (no pod restart expected).
Verification
- Secret
resourceVersionchanges. status.secretsResourceVersionincludes updated version forAUTH_SECRET.redis-cli -a "$NEW_PASSWORD" pingsucceeds.- Data pods do not restart solely for auth rotation.
- Cluster returns/stays
Healthy.
Escalation
- If auth update succeeds but Redis rejects new password, check projected secret mounts under
/projected/<secretName>/passwordand instance-manager logs. - If rotation causes broad client auth failures, roll clients first/fast and coordinate incident communication.